First published: Wed Apr 12 2023(Updated: )
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/connman | <=1.36-2.1<=1.41-2<=1.36-2.2<=1.36-2.2+deb11u1 | |
Intel Connman | >=0.55<=1.41 | |
debian/connman | <=1.36-2.1~deb10u2 | 1.36-2.1~deb10u5 1.36-2.2+deb11u2 1.41-3 1.42-5 |
ubuntu/connman | <1.35-6ubuntu0.1~ | 1.35-6ubuntu0.1~ |
ubuntu/connman | <1.36-2ubuntu0.1 | 1.36-2ubuntu0.1 |
ubuntu/connman | <1.36-2.3ubuntu0.1 | 1.36-2.3ubuntu0.1 |
ubuntu/connman | <1.21-1.2+ | 1.21-1.2+ |
ubuntu/connman | <1.41-2ubuntu0.23.04.1 | 1.41-2ubuntu0.23.04.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-28488 is high with a severity value of 7.
The affected software for CVE-2023-28488 includes ConnMan versions up to and including 1.41-2.
Network-adjacent attackers can exploit CVE-2023-28488 by operating a crafted DHCP server to cause a stack-based buffer overflow and denial of service.
To fix CVE-2023-28488, you should update ConnMan to version 1.41-3 or apply the recommended patches provided by the software vendor.
More information about CVE-2023-28488 can be found in the references provided: [Link 1], [Link 2], [Link 3].